How can we help?

You can also find more resources in our Help Center.

chapter 11 computer science

STUDY
PLAY
not all breaches to computer security are planned
true
hackers often claim the intent of their security breaches is to improve security
true
many methods exist ot guarantee completely a computer or network is safe from computer viruses, worms, and trojan horses
false
cybercriminals install malicious bots unprotected computers to create zombie armies
true
a honeypot is a computer that is set up to entice an intruder to break in
true
biometric payment involves a customer's fingerprint being read by a fingerprint scanner that is linked to a payment method such as checkin account or credit card
true
encrypted data is called plaintext
false
a digital signature is a mathematical formula that generates a code from the contents of the message
false
an online ups switches to battery power when a problem occurs in a power line
false
digital rights management is a strategy designed to prevent illegal distriubtion of computer viruses etc.
false
a cookie is a small text fiel that a wb server stores on the computer
true
green computing involves reducing the electricity while using a computer, but the practices increase enviormental waste.
false
a computer infected system is all but
available memory is more
malware is a term that can be used to describe
worms spyware back doors
zombie
computer unkowingly being controlled by another remote computer
email spoofing
used for spam and phishing scams
physical access control such as locked doors and windows usually are adequate to protect against
hardware theft
software piracy continues
because in some countries legal protection of software does not exist
windows vista include a featurecalled
bitlocker, which allows you to enrypte files
digital certificate
a notice that guarantees a usar or website site is legit
brownout
prolonged under voltage
phishing
defined as gaining inauthorized access or obtaining confedential info by taking advantage of the trusted human
forensics analysis
examination of computer media, programs, data and log files on computers, servers, networks
Carpal tunnel
inflammation of nerve connecting forearm to the palm of the wrist
cracker
someone who accesses a computer or net illegally with the intent of malicious actions
virus
potentially damaging computer program that affects infects a computer negatively
quarantine
area of the hard disk that holds an infected file until the infection is removed
botnet
a group of comprimised computers connected to a network that is being used as part of a network that attacks other networks
personal firewall
protects a personal computer and its data from unauthorized intrusions
password
private combination of characteristic into digital code
biometric device
translates a personal characeristic into digital code
surge protector
provide steady flow of electricity
spyware
key commands and startup info
adware
displays online advertisment